1 Answer
1

Not to my knowledge. Here is a possible explanation: non-trivial differential attacks are rather difficult to find in a fully automated way, and most of the time, one requires some (human) insight from a cryptanalyst before beginning to write some software.

Another explanation could be the following: cutting-edge differential attacks (like against SHA-3 candidates, for instance) are performed by world-class crypto researchers, and the competition (being the first to publish) is rather rough. So, people do not take the time, or are not always willing to share their software with everybody.